7,662 Hits in 4.3 sec

Graphical Calculus for Quantum Key Distribution (Extended Abstract)

Bob Coecke, Quanlong Wang, Baoshan Wang, Yongjun Wang, Qiye Zhang
2011 Electronical Notes in Theoretical Computer Science  
Controlled complementary measurements are key to quantum key distribution protocols, among many other things.  ...  of quantum public-key cryptography relies on the foundations of quantum mechanics, and can detect eavesdropping by comparing bit by bit a subset of the data of the communicating parties.  ...  It enables using (7) of Definition 3.3 to show correctness in the case of different choices of measurement by Alice and Bob of the quantum key distribution protocols.  ... 
doi:10.1016/j.entcs.2011.01.034 fatcat:dwdv3lu3ifaaphq75oqk454tre

Information Theoretically Secure Hypothesis Test for Temporally Unstructured Quantum Computation (Extended Abstract)

Daniel Mills, Anna Pappa, Theodoros Kapourniotis, Elham Kashefi
2018 Electronic Proceedings in Theoretical Computer Science  
By allowing a verifying client to manipulate single qubits, we exploit properties of measurement based blind quantum computing to give them the tools to test the "quantum superiority" of the server.  ...  The efficient certification of classically intractable quantum devices has been a central research question for some time.  ...  This work was supported by grant EP/L01503X/1 for the University of Edinburgh School of Informatics Centre for Doctoral Training in Pervasive Parallelism, from the UK Engineering and Physical Sciences  ... 
doi:10.4204/eptcs.266.14 fatcat:5ixhsdpw2jhefkxrdc3sybobim

On Learning Correlated Boolean Functions Using Statistical Queries (Extended Abstract) [chapter]

Ke Yang
2001 Lecture Notes in Computer Science  
This result is useful since the hardness of learning booleanized linear functions over a nite eld is related to the security of certain cryptosystems ( B01]).  ...  With properly chosen parameters, this class of linear threshold functions can become an example of PAC-learnable, but not SQ-learnable functions that are not parity functions. An extended abstract  ...  Avrim Blum gave a lot of invaluable advice on what problems are interesting and helped formulate ideas into a paper.  ... 
doi:10.1007/3-540-45583-3_7 fatcat:ua5mnenfdbh4xipl4giirxhhny

Hash Proof System Based on Lattice

Feng Xia, Bo Yang, Qiong Huang, Sha Ma
2012 International Journal of Advancements in Computing Technology  
We also show how to construct a public-key encryption scheme which is semantically secure against key-leakage attacks in the standard model using our HPS based on lattice.  ...  Compared with previous cryptosystem based on lattice, our construction needs bigger public key space but fewer operations during encryption, and can resist quantum attacks because of the assumption on  ...  [6] presented a generic construction of a public-key encryption scheme that is resilient to key leakage from any hash proof system and extended the framework of key leakage to the setting of chosen-ciphertext  ... 
doi:10.4156/ijact.vol4.issue8.1 fatcat:44gkrtfkvzcgngtjtbkk2jtmsm

Information Conservational Security with "Black Hole" Keypad Compression and Scalable One-Time Pad - A Quantum Intelligence Approach to Pre- and Post-Quantum Cryptography [article]

Wen-Ran Zhang
2019 IACR Cryptology ePrint Archive  
To prove this point, ITS of OTP is extended to information conservational security (ICS) of scalable OTP (S-OTP) with percentage-based key extension where total key length can be reduced to a condensed  ...  This proof bridges a classical world with a quantum world and makes it possible to combine the advantages of both approaches for pre and post-quantum cryptography.  ...  ACKNOWLEDGEMENT The author acknowledges his colleague Professor Kai Wang in the Computer Science Department of Georgia Southern University for his input in double precision floating-point computing.  ... 
dblp:journals/iacr/Zhang19 fatcat:hmcuststrrcp3h7o4j2rh3tnqa

Information Security in a Quantum World [chapter]

Renato Renner
2012 Lecture Notes in Computer Science  
A prominent example is the RSA public key cryptosystem, whose security is based on the hardness of factoring; it can be broken using a quantum computer running Shor's efficient factoring algorithm.  ...  In this extended abstract, we review an argument which shows that a similar problem can arise even if a cryptosystem provides information-theoretic security.  ...  Acknowledgements This work was supported by the Swiss National Science Foundation (grant 200020-135048 and through the National Centre of Competence in Research Quantum Science and Technology) and the  ... 
doi:10.1007/978-3-642-25929-6_5 fatcat:5go5rfinzrbdrcdvr4xsrr5rvy


2008 International Journal of Quantum Information  
As an application of these techniques, we prove the security of quantum key distribution (QKD), i.e., secret key agreement by communication over a quantum channel.  ...  The proof is generic and thus applies to known protocols such as BB84 and B92 (where better bounds vii viii on the secret-key rate and on the the maximum tolerated noise level of the quantum channel are  ... 
doi:10.1142/s0219749908003256 fatcat:srpapwllvzcalckuv634u2x4sa

Page 1438 of Mathematical Reviews Vol. , Issue 2001B [page]

2001 Mathematical Reviews  
era- sures (extended abstract) (221-242); Jan Camenisch and Markus Michels, Confirmer signature schemes secure against adaptive ad- versaries (extended abstract) (243-258); Mihir Bellare, Alexandra Boldyreva  ...  and Silvio Micali, Public-key encryption in a multi- user setting: security proofs and improvements (259-274); Victor Shoup, Using hash functions as a hedge against chosen cipher- text attack (275-288  ... 

Improved Data Post-Processing in Quantum Key Distribution and Application to Loss Thresholds in Device Independent QKD [article]

Xiongfeng Ma, Norbert Lütkenhaus
2011 arXiv   pre-print
Security proofs of quantum key distribution (QKD) often require post-processing schemes to simplify the data structure, and hence the security proof.  ...  We show a generic method to improve resulting secure key rates by partially reversing the simplifying post-processing for error correction purposes.  ...  This work is supported by NSERC via the Innovation Platform Quantum Works, the Discovery grant programme, and the Strategic Project Grant FREQUENCY, and by the Ontario Research Fund (ORF).  ... 
arXiv:1109.1203v1 fatcat:ep3d4j5jdfemxitvkxc3sgnvuy

Efficient Almost Strongly Universal Hash Function for Quantum Key Distribution [chapter]

Bo Liu, Baokang Zhao, Chunqing Wu, Wanrong Yu, Ilsun You
2015 Lecture Notes in Computer Science  
Unlike conventional cryptography which based on the computational complexity, Quantum Key Distribution (QKD) can achieve the unconditional security communication [1, 2] [18, 19, 20] .  ...  In this extended abstract, with NTT technology, we proposed a novel Efficient ε-Almost Strongly Universal Hash Function.  ... 
doi:10.1007/978-3-319-24315-3_29 fatcat:hcq6uyfp75bbzopfkqf6jsnmmm

A genetic algorithm to analyze the security of quantum cryptographic protocols

Walter O. Krawec
2016 2016 IEEE Congress on Evolutionary Computation (CEC)  
extended abstract [6] we first proposed the idea of using a GA to analyze QKD protocols 4 In this paper, we extend this technique to work with more general QKD protocols and perform a more thorough analysis  ...  Quantum Key Distribution (QKD) 1 Allows two users -Alice (A) and Bob (B) -to establish a shared secret key 2 Secure against an all powerful adversary Does not require any computational assumptions Attacker  ...  security Background Quantum Key Distribution 1 A QKD protocol first performs the quantum communication (QC) stage 1 Ultimately, a QKD protocol may be modeled mathematically as a (possibly large) matrix  ... 
doi:10.1109/cec.2016.7744047 dblp:conf/cec/Krawec16 fatcat:5vwcbctja5b2ti275as6rgyt3a

Continuous-variable measurement-device-independent quantum key distribution: Composable security against coherent attacks

Cosmo Lupo, Carlo Ottaviani, Panagiotis Papanastasiou, Stefano Pirandola
2018 Physical Review A  
We present a rigorous security analysis of Continuous-Variable Measurement-Device Independent Quantum Key Distribution (CV MDI QKD) in a finite size scenario.  ...  The security proof is obtained in two steps: by first assessing the security against collective Gaussian attacks, and then extending to the most general class of coherent attacks via the Gaussian de Finetti  ...  C.L. acknowledges the valuable scientific support received from the Quantum Physics and Information Technology Group (QPIT) of the Technical University of Denmark (DTU), and is specially grateful to Anthony  ... 
doi:10.1103/physreva.97.052327 fatcat:5xq5jft44rah7gt6ho45komh4m

A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols [article]

Cas Cremers, Caroline Fontaine, Charlie Jacomme
2022 IACR Cryptology ePrint Archive  
We provide the first mechanized post-quantum sound security protocol proofs.  ...  Using PQ-Squirrel, we perform several case studies, thereby giving the first mechanical proofs of their computational post-quantum security.  ...  For the same purpose, they also define a way to extend version 2 so that the final key computation depends on a pre-shared key.  ... 
dblp:journals/iacr/CremersFJ22 fatcat:lkmdo53rjrboheysohql2dakfi

Fusing Keys for Secret Communications: Towards Information-Theoretic Security [article]

Longjiang Li, Bingchuan Ma, Jianjun Yang, Yonggang Li, Yuming Mao
2020 arXiv   pre-print
The correctness of the scheme is strictly verified through a toy model that is general enough to abstract the physical-layer key generation (PLKG) mechanisms.  ...  However, the exposure possibility of keys poses a great threat to almost all modern cryptography.  ...  Quantum cryptography or quantum key distribution (QKD) provides what is claimed to be the information-theoretic security based on quantum physics, but it faces a number of implementation challenges such  ... 
arXiv:2010.11441v2 fatcat:4levx6gx2nhtvooxjmvsi2veku

Symbolic Abstractions for Quantum Protocol Verification [article]

Lucca Hirschi
2019 arXiv   pre-print
Quantum protocols such as the BB84 Quantum Key Distribution protocol exchange qubits to achieve information-theoretic security guarantees.  ...  Existing security proofs in that field are mostly tedious, error-prone pen-and-paper proofs of the core protocol only that rarely account for other crucial components such as authentication.  ...  Acknwoledgements The author would like to thank David Basin and Ralf Sasse for their helpful comments and suggestions on earlier drafts of this paper and to Renato Renner for his quantum expert feedback  ... 
arXiv:1904.04186v2 fatcat:7lz7ki3oqjarbgcf2mge7btze4
« Previous Showing results 1 — 15 out of 7,662 results